info@elabnody.net
(+20) 11 1120 1628

CS Blog

">

Email Client Setup: Comparing POP vs. IMAP

What is POP and IMAP?

POP (Post Office Protocol). This is a method that your email client can use to connect to our email server for retrieving messages. This connection type allows you to download messages from our email server onto your computer. When looking at your email via your email client, you’re looking at your downloaded copies of those messages, not your original messages that still exist inside of your mailbox. Continue reading →


">

Email Client Setup: Outlook 2010 – Step by Step Walkthrough (IMAP)

You will need your incoming mail server, outgoing mail server, full email address, and your email password. You can find these settings by logging into your Mail Central.

  1. Open Outlook 2010.
  2. Click File.
  3. Select Info. Continue reading →

">

Email Client Setup: Outlook 2010 – Step by Step Walkthrough (POP)

You will need your incoming mail server, outgoing mail server, full email address, and your email password. You can find these settings by logging into your Mail Central.

  1. Open Outlook 2010.
  2. Click File.
  3. Select Info. Continue reading →

">

How to Install Windows 8

The best way to install Windows 8 is to do a clean install. Before you start the installation check Windows 8 System Requirements to ensure that your hardware is supported by Windows 8.

If you don’t have Windows 8 drivers for all your hardware, it is a good idea to download all the drivers from the hardware manufacturers web site and save all the necessary drivers on a CD/DVD or a USB drive before you start the installation. Continue reading →


">

Introduction to Web Security

Overview

Why Be Concerned about Web Security?

The increased use of the networks and the internet helps users finish many tasks quickly and efficiently and adds convenience to many people’s lives. However, there is downside, as well. As more and more personal and business data is stored on computer networks, the risk and consequences of unauthorized computer access, theft, fraud, and other types of computer crime increase; so do the chances of data loss due to crime or employee misconduct.

Continue reading →